Search results for computer
We found 480 results
IT Best Practices: Purchasing a New Computer
Peter goes into the key steps and decisions to make before buying a new computer to make sure you end up with a machine that fits your needs and budget.
OneDrive For Everyday Users
“OneDrive” is a personal cloud-based storage platform provided by Microsoft that is connected to your Windows 10 computer.
Windows 8.1
To use a symphonic orchestra as metaphor for a computer, one could say that the musicians and their instruments symbolizes the computer hardware, the nodeleaflets with music on symbolizes the computer
Excel 365 Basics
EXCEL 365 BASICS: CALCULATING ON THE COMPUTER bAsIC ACtIons92 BASIC ACTIONS2.1 INTRODUCTIONCalculating is one of the most powerful and widely used applications on the computer.
Cyberattacks and Cybersecurity
or financial gain or harm• Computer‐related fraud or forgery• Computer‐related identity offenses• Computer‐related copyright or trademark offenses• Sending or controlling sending of spam• Computer‐related
Excel 2019 Basics
EXCEL 2019 BASICS: CALCULATING ON THE COMPUTER bAsIC ACtIons92 BASIC ACTIONS2.1 INTRODUCTIONCalculating is one of the most powerful and widely used applications on the computer.
In Focus: How Children Learn Through Play
Thought it was really interesting what you said earlier aboutlearning from the computer games that your Children are playing andthe way that they're learning, sharing and collaboration.
IT Governance Controls - Book 2
Control Type 1.3.: Radiation Prevention ControlsComputer equipment and the wiring and computer rooms themselves should be shielded to contain the radiation emanated by computers in order to avoid some
AI Essentials
A computer follows to solve a problem.Like a recipefor baking a cake.Machine learningA form of AIwhere a computer learns from data withoutbeing explicitly programmed for each step.
Data Protection Specialized Controls
Computer equipment, the wiring and computer rooms themselves should be shielded to contain the radiation emanated by computers in order to avoid some external party from picking up all the critical communications